35,653 research outputs found

    Pervasive Messaging

    Get PDF
    Pervasive messaging is the part of pervasive computing that enables users to communicate with each other. Many of today's electronic messaging systems have their own distinct merits and peculiarities. Pervasive messaging will have to shield the user from these differences. In this paper, we introduce a taxonomy for electronic messaging systems, providing a uniform way to analyze, compare, and discuss electronic messaging systems. With this taxonomy, we analyze the current practice, demonstrating its shortfalls. To overcome these shortfalls, we introduce a novel messaging model: The Unified Messaging System. This system can, in fact, mimic any electronic messaging system, thus providing powerful unified messaging

    Pervasive Messaging

    Get PDF

    Mobile Instant Messaging Evidence in Criminal Trials

    Get PDF
    Mobile instant messaging, such as text messages, are a pervasive aspect of everyday life. The characteristics of the modern mobile instant messaging application, especially in comparison with other forms of more traditional electronic communication platforms, such as e-mail, text messaging, or computer-based instant messaging program, present a variety of evidentiary issues in trial. To be relevant, mobile instant messaging evidence must be connected to a genuine issue at trial and not too attenuated from it. Authentication is also very important in determining whether it may be considered a non-hearsay statement. Although often otherwise admissible, mobile instant messaging evidence may still be inadmissible if its probative value is substantially outweighed by the risk of unfair prejudice or other concerns of fairness. This comment examines the evidentiary issues surrounding the admissibility of the mobile instant messaging evidence in criminal trials, with particular emphases on the issues of authentication and the best evidence doctrine

    Context-aware Authorization in Highly Dynamic Environments

    Get PDF
    Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require frequent adaptation of applications. Context is a key to adapt suiting user needs. On the other hand, standard access control trusts users once they have authenticated, despite the fact that they may reach unauthorized contexts. We analyse how taking into account dynamic information like context in the authorization subsystem can improve security, and how this new access control applies to interaction patterns, like messaging or eventing. We experiment and validate our approach using context as an authorization factor for eventing in Web service for device (like UPnP or DPWS), in smart home security

    What can we get “help” to observe when it comes to mobile use and mobile user experience?

    Get PDF
    Mobile devices and mobile services have been around long enough for the research community to start thinking about the next step in studying them: larger user groups and longer periods of time. Strictly quantitative methods are not very useful when it comes to studying user experience so we need to find scalable ways to support our qualitative methods to be able to take this next step. This paper reflects on automatic gathering of context data as one such way

    Undercurrents – A Computer-Based Gameplay Tool to Support Tabletop Roleplaying

    Get PDF
    This paper introduces Undercurrents, a computer-based gameplay tool for providing additional communication and media streams during tabletop roleplaying sessions. Based upon a client-server architecture, the system is intended to unobtrusively support secret communication, timing of audio and visual presentations to game events, and real-time documentation of the game session. Potential end users have been involved in the development and the paper provides details on the full design process

    Rhythms of social interaction: messaging within a massive online network

    Full text link
    We have analyzed the fully-anonymized headers of 362 million messages exchanged by 4.2 million users of Facebook, an online social network of college students, during a 26 month interval. The data reveal a number of strong daily and weekly regularities which provide insights into the time use of college students and their social lives, including seasonal variations. We also examined how factors such as school affiliation and informal online friend lists affect the observed behavior and temporal patterns. Finally, we show that Facebook users appear to be clustered by school with respect to their temporal messaging patterns

    Enabling pervasive computing with smart phones

    Get PDF
    The authors discuss their experience with a number of mobile telephony projects carried out in the context of the European Union Information Society Technologies research program, which aims to develop mobile information services. They identify areas where use of smart phones can enable pervasive computing and offer practical advice in terms of lessons learned. To this end, they first look at the mobile telephone as * the end point of a mobile information service,* the control device for ubiquitous systems management and configuration,* the networking hub for personal and body area networks, and* identification tokens.They conclude with a discussion of business and practical issues that play a significant role in deploying research systems in realistic situations
    corecore